Search
Now showing items 21-30 of 145
A fast method for approximate registration of whole-slide images of serial sections using local curvature
(
SPIE
, 2014 , Conference Paper)
We present a method for fast, approximate registration of whole-slide images (WSIs) of histopathology serial sections. Popular histopathology slide registration methods in the existing literature tend towards intensity-based ...
A PLM components monitoring framework for SMEs based on a PLM maturity model and FAHP methodology
(
Mundo Press
, 2014 , Article)
Right PLM components selection and investments increase business advantages. This paper develops a PLM components monitoring framework to assess and guide PLM implementation in small and middle enterprises (SMEs). The ...
Coalitional double auction for spatial spectrum allocation in cognitive radio networks
(
IEEE
, 2014 , Article)
Recently, many dynamic spectrum allocation schemes based on economics are proposed to improve spectrum utilization in cognitive radio networks (CRNs). However, existing mechanisms do not take into account the economic ...
The similarity-aware relational intersect database operator
(
Springer International Publishing
, 2014 , Conference Paper)
Identifying similarities in large datasets is an essential operation in many applications such as bioinformatics, pattern recognition, and data integration. To make the underlying database system similarity-aware, the core ...
RSU cloud and its resource management in support of enhanced vehicular applications
(
IEEE
, 2014 , Conference Paper)
We propose Roadside Unit (RSU) Clouds as a novel way to offer non-safety application with QoS for VANETs. The architecture of RSU Clouds is delineated, and consists of traditional RSUs and specialized micro-datacenters and ...
ConProve: A conceptual prover system
(
IEEE
, 2014 , Conference Paper)
ConProve is an automated prover for propositional logic. It takes, as an input, a set of propositional formulas and proves whether a goal holds or not. ConProve converts each formula to its corresponding Truth Table Binary ...
Software project management: Theory of constraints, risk management, and performance evaluation
(
Mundo Press
, 2014 , Article)
Constraints and risks are two critical factors that affect software project performance; more attention needs to be paid to constraints and risks in order to improve performance. In this paper, investigation will take place ...
Effectiveness of combined time-frequency imageand signal-based features for improving the detection and classification of epileptic seizure activities in EEG signals
(
IEEE
, 2014 , Conference Paper)
This paper presents new time-frequency (T-F) features to improve the detection and classification of epileptic seizure activities in EEG signals. Most previous methods were based only on signal features derived from the ...
A fully accessible Arabic learning platform for assisting children with intellectual challenges
(
Springer International Publishing
, 2014 , Conference Paper)
Children with intellectual challenges (IC) are growing up with wide exposure to computer technology. Computer software and assistive devices have the potential to help these children in their education, career development, ...
A non-inclusive memory permissions architecture for protection against cross-layer attacks
(
IEEE
, 2014 , Conference Paper)
Protecting modern computer systems and complex software stacks against the growing range of possible attacks is becoming increasingly difficult. The architecture of modern commodity systems allows attackers to subvert ...